A timing and power-based side channel attack leveraging the x86 PREFETCH instructions on some AMD CPUs could potentially result in leaked kernel address space information.
Two separate operations in a product require different amounts of time to complete, in a way that is observable to an actor and reveals security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Athlon_firmware | Amd | - (including) | - (including) |
Amd64-microcode | Ubuntu | bionic | * |
Amd64-microcode | Ubuntu | hirsute | * |
Amd64-microcode | Ubuntu | impish | * |
Amd64-microcode | Ubuntu | kinetic | * |
Amd64-microcode | Ubuntu | lunar | * |
Amd64-microcode | Ubuntu | mantic | * |
Amd64-microcode | Ubuntu | trusty | * |
Amd64-microcode | Ubuntu | trusty/esm | * |
Amd64-microcode | Ubuntu | xenial | * |